US11385893B2 - Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations - Google Patents
Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations Download PDFInfo
- Publication number
- US11385893B2 US11385893B2 US17/048,262 US201917048262A US11385893B2 US 11385893 B2 US11385893 B2 US 11385893B2 US 201917048262 A US201917048262 A US 201917048262A US 11385893 B2 US11385893 B2 US 11385893B2
- Authority
- US
- United States
- Prior art keywords
- value
- masked
- boolean
- xor
- computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/30029—Logical and Boolean instructions, e.g. XOR, NOT
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/3001—Arithmetic instructions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Definitions
- the present invention relates to the field of cryptographic methods and devices protected against side channel analysis, and more particularly to protecting against side-channel attacks a cryptographic algorithm mixing Boolean and arithmetic operations.
- Cryptographic algorithms are commonly used for ensuring the privacy of communications by encryption, for authentication or for generating a verifiable signature. Such cryptographic algorithms are sensitive to side-channel attacks, based on an analysis of the power consumption or electromagnetic signature of the device performing the encryption.
- a commonly used countermeasure against side-channel attacks is the masking of the intermediate values of an encryption process with a random mask. In that case, an attacker performing a side-channel attack at a given point of the encryption process would only get random values and would not obtain any information on the secret key used for the cryptographic process.
- Some cryptographic algorithms may mix Boolean and arithmetic operations such as MD5 or SHA hash functions or some block cipher algorithms. Since arithmetic operations and Boolean operations are not commutative, arithmetic masking and Boolean masking are not compatible and keeping all intermediate results of such algorithms masked may prove difficult: obtaining a masked result of an arithmetic operation between two values requires more than just performing said arithmetic operation on these two values masked by Boolean masks.
- a first way to deal with such an issue is to perform conversion between Arithmetic and Boolean masking when needed for having intermediate values masked using the kind of masking compatible with the next operation to be performed.
- Such an approach was proposed for example in L. Goubin “ A sound method for switching between Boolean and Arithmetic masking ”.
- the main drawback of such an approach is its cost for performing Arithmetic to Boolean masking, which depends linearly on the size of the values and masks to be handled.
- the method was improved using precomputation of tables, such as in J. S. Coron, A. Tchulkine “ A new algorithm for switching from arithmetic to boolean masking ”. Nevertheless, the global computation time of such a method still strongly depends on the values and masks to be handled.
- this invention therefore relates to a method secured against side channel attacks performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations,
- a cryptographic device comprising a processing system having at least one hardware processor, and said operation has a first value and a second value as operands
- Each computing step may combine a plurality of values among: said first masked value, said second masked value, said first value masked by said second Boolean mask, said second value masked by said first Boolean mask, said first value masked with said second masked value as Boolean mask, said second value masked with said first masked value as Boolean mask, said first boolean mask, and said second boolean mask.
- said computing steps comprise:
- said computing steps comprise:
- said computing steps comprise:
- Such methods enable to perform said arithmetic operation on values masked by Boolean masks in a number of elementary operations that does not depend on the size of the operands of the operation, while keeping at all times all intermediate values and result values masked and therefore protected against a side channel attack.
- Such methods may comprise blinding two values among the first, second and third intermediate values computed during said first, second and third computing steps using a random value.
- Such an additional blinding enables to increase even more the protection of the method against side channel analysis.
- the step of blinding an intermediate value may comprise:
- the cryptographic algorithm may perform functions among a hash function, a block cipher and a stream cipher.
- the hash function may be among MD5, SHA1, SHA256, SHA512, Skein functions
- the block cipher may be among XTEA, FEAL, SPECK, Threefish functions and/or the stream cipher may be among Salsa20, ChaCha functions.
- this invention therefore relates also to a computer program product directly loadable into the memory of at least one computer, comprising software code instructions for performing the steps of the methods according to the first aspect when said product is run on the computer.
- this invention therefore relates also to a non-transitory computer readable medium storing executable computer code that when executed by a cryptographic device comprising a processing system having at least one hardware processor performs the methods according to the first aspect.
- this invention therefore relates also to a cryptographic device comprising:
- FIG. 1 is a schematic illustration of a system according to an embodiment of the present invention
- FIG. 2 is a schematic illustration of a cryptographic device according to an embodiment of the present invention.
- FIGS. 3, 3 a , 3 b , 3 c illustrate schematically a method according the present invention and several embodiments of the present invention.
- the invention aims at providing a method performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations, in a way that is secured against side channel attacks.
- This cryptographic algorithm may perform functions comprising both types of operations, such as a hash function, like MD5, SHA1, SHA256, SHA512 or Skein functions, a block cipher like XTEA, FEAL, SPECK (https://eprint.iacr.org/2013/404.pdf) or Threefish functions, or a stream cipher like Salsa20 or ChaCha functions.
- this method is performed by a cryptographic device 101 .
- a cryptographic device 101 may be connected to a personal computer or server 102 operated by a user and sending commands to the cryptographic device for cryptographic operations such as data encryption or decryption.
- the cryptographic device 101 may be embedded in the computer 102 .
- the cryptographic device 101 may include or be a tamper resistant device 103 secured against any unauthorized access including a processing system having at least one hardware processor for performing cryptographic operations, and at least one memory configured for storing the data needed for such operations, such as operands, intermediate results, mask values . . . .
- a cryptographic device may for example be a smartcard reader housing a smartcard device, or an electronic device, such as a smartphone, including an embedded smartchip.
- the cryptographic device 101 may include a processing system 201 having at least one hardware processor, connected via a bus 202 to a computer readable memory circuit including a random access memory (RAM) 203 , a read-only memory (ROM) 204 , and/or a non-volatile memory (NVM) 205 .
- the cryptographic device 101 may also include a random number generator (RNG) 206 , included in the hardware processor or connected to it via the bus.
- the cryptographic device 101 may further include an interface 207 used to connect the cryptographic device 101 to the computer 102 .
- Such an interface may be either a wired interface such as a USB, Ethernet or Thunderbolt interface, or a wireless interface, such as a Bluetooth interface.
- the interface 207 may also be used to connect the cryptographic device 101 to a wireless network, e.g., wide-area networks, WiFi networks, or mobile telephony networks through which communication may be performed with the computer 102 .
- the “+” sign will be used to represent said arithmetic operation and the “modulo 2 ⁇ circumflex over ( ) ⁇ k” will be omitted.
- the aim of the method is to compute the result of the arithmetic operation having said first value x and said second value y as operands, for example x+y. In order to keep the result secured against side channel analysis, it shall be provided under a masked state.
- the method according to the invention is designed to be used when an arithmetic operation shall be performed after a Boolean operation of the cryptographic algorithm mixing Boolean and arithmetic operations has been performed and has outputted values masked by Boolean masks. Therefore, during a first step S 1 , the cryptographic device 101 shall obtain the operands of the operation x and y, masked by Boolean masks.
- the expression “value masked by a Boolean mask” or “boolean masked value” is used to describe the result of performing a Boolean operation, such as a Boolean exclusive OR operation, XOR, between the value to be masked and another value to be used as mask.
- a Boolean mask For example, masking a value v by a Boolean mask m produces a Boolean masked value v xor m.
- the expression “masked by an arithmetic mask” is used to describe the result of performing an arithmetic operation, noted by the sign “+” as mentioned here above, such as an addition or subtraction, between a value to be masked and another value to be used as mask.
- the value to be used as mask is called an arithmetic mask.
- masking a value v by an arithmetic mask n produces a masked value v+n.
- the cryptographic device 101 shall obtain:
- Such values may for example be read from the RAM 203 , the ROM 204 , and/or the NVM 205 of the cryptographic device 101 .
- the cryptographic device may perform in any order a plurality of computing steps combining values among the first masked value x′, the second masked value y′, the first Boolean mask r x and the second Boolean mask r y to obtain a boolean masked result equal to the result of the arithmetic operation having the first value x and the second value y as operands, masked by a third boolean mask r x xor r y resulting from performing a XOR operation between the first Boolean mask r x and the second Boolean mask r y .
- such computing steps compute the value (x+y) xor (r x xor r y ).
- These computing steps are executed by the hardware processor of the cryptographic device by performing a constant number of elementary operations whatever the bit-size of the first and second values x and y.
- Performing an elementary operation may require performing one or more basic CPU instructions, depending on the number of basic CPU instructions required for applying the operation to operands of a given bit-size, which itself depends on the size of the registers and the buses of the hardware processor. For example a 32-bit processor may need only one basic instruction for performing an elementary operation on operands of a size up to 32 bits; but it may require at least two basic instructions for performing the same elementary operation on operands of a bigger size.
- these computing steps may be executed by the hardware processor of the cryptographic device by performing a first constant number of elementary operations when operands x and y have a bit-size lower or equal than the size of the registers and the buses of the hardware processor; they may be executed by the hardware processor of the cryptographic device by performing a second constant number of elementary operations when operands x and y have a bit-size between this registers/buses size and twice that size; and so on . . . .
- the cryptographic device outputs said boolean masked result of the arithmetic operation between said first value x and said second value y.
- This boolean masked result is equal to (x+y) xor (r x xor r y ).
- the cryptographic device may combine, at each computing step, a plurality of values among the first masked value x′, the second masked value y′, the first value x masked by the second Boolean mask r y , the second value y masked by the first Boolean mask r x , the first value x masked by the second masked value y′ as Boolean mask, the second value y masked by the first masked value x′ as Boolean mask, the first boolean mask r x , and the second boolean mask r y
- the second step S 2 comprises:
- the Boolean masked result (x+y) xor (r x xor r y ) is computed, from the values obtained during the first step S 1 , by performing only nine elementary operations (7 XOR and 2 arithmetic operations), whatever the bit-size of the first and second values, x and y, may be.
- the second step S 2 comprises:
- the Boolean masked result (x+y) xor (r x xor r y ) is also computed, from the values obtained during the first step S 1 , by performing only nine elementary operations (7 XOR and 2 arithmetic operations), whatever the bit-size of the first and second values, x and y, may be.
- the second step S 2 comprises:
- first value x unmasked In order to avoid manipulating the first value x unmasked, it may be replaced in the formula above by x′ xor r x .
- the Boolean masked result (x+y) xor (r x xor r y ) is also computed, from the values obtained during the first step S 1 , by performing only nine elementary operations (7 XOR and 2 arithmetic operations), whatever the bit-size of the first and second values, x and y, may be.
- two values among the first, second and third intermediate values A, B and C computed during the first, second and third computing steps may be blinded by a random value Rand.
- the method may comprise a blinding step S 25 , during which the cryptographic device arithmetically masks two values among the first, second and third intermediate values by performing an arithmetic operation with the random value Rand.
- the cryptographic device performs:
- the cryptographic device performs:
- the cryptographic device performs:
- the cryptographic device shall, in addition during the blinding step S 25 , perform an arithmetic masking to boolean masking conversion of these arithmetically masked intermediate values into Boolean masked intermediate values masked by the random value Rand. Such a conversion may be performed using a conversion function CONV.
- the cryptographic device shall turn values A+Rand and B+Rand into A xor Rand and B xor Rand.
- the cryptographic device performs:
- the cryptographic device performs:
- the cryptographic device performs:
- the conversion function CONV may be a precomputed Look-Up Table. But such a precomputed LUT performing a masking conversion may become very large as the bit-size k of the first and second intermediate values A and B, and of the first and second values x and y, increases.
- masking conversion of A+Rand or B+Rand may be performed by processing in parallel chuncks of size s.
- A A m ⁇ 1
- a 0 and D D m ⁇ 1
- D xor Rand D m ⁇ 1 xor mini-rand
- the second step S 2 comprises the following computations, using the same notations as above:
- this invention therefore relates also to a computer program product directly loadable into the memory of at least one computer, comprising software code instructions for performing the steps of the methods according to the first aspect when said product is run on the computer.
- this invention therefore relates also to a non-transitory computer readable medium storing executable computer code that when executed by a cryptographic device comprising a processing system having at least one hardware processor performs the methods according to the first aspect.
- this invention therefore relates also to a cryptographic device 101 comprising:
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
Abstract
Description
-
- obtaining a first masked value, a second masked value, a first Boolean mask, a second Boolean mask,
- said first masked value resulting from masking said first value by said first Boolean mask by performing a Boolean exclusive OR (XOR) operation between said first value and said first Boolean mask,
- and said second masked value resulting from masking said second value by said second Boolean mask by performing a Boolean exclusive OR (XOR) operation between said second value and said second Boolean mask,
- performing in any order a plurality of computing steps combining values among said first masked value, said second masked value, said first Boolean mask and said second Boolean mask to obtain a boolean masked result equal to the result of the arithmetic operation having said first value and said second value as operands, masked by a third boolean mask resulting from performing said Boolean exclusive OR (XOR) operation between said first Boolean mask and said second Boolean mask,
- wherein said computing steps perform Boolean exclusive OR (XOR) operations or arithmetic operations between said values without disclosing any information relative to the first and second values and,
- wherein said computing steps are executed by the hardware processor by performing a constant number of elementary operations whatever the bit-size of said first and second values,
- outputting said boolean masked result of the arithmetic operation between said first value and said second value.
-
- a first computing step computing a first intermediate value A from said first masked value x′, said second boolean mask ry, said second masked value y′ and said first boolean mask rx such that A=(x′ xor ry)+(y′ xor rx),
- a second computing step computing a second intermediate value B from said first masked value x′, said second masked value y′, said first boolean mask rx, and said second boolean mask ry such that B=(x′ xor y′)+(rx xor ry),
- a third computing step computing a third intermediate value C from said first masked value x′, said second masked value y′ such that C=x′ xor y′,
- a fourth computing step computing said boolean masked result of the arithmetic operation between said first value (x) and said second value (y) by performing said boolean exclusive OR (XOR) operation between said first, second, and third intermediate values (A xor B xor C),
-
- a first computing step computing a first intermediate value A from said first boolean mask rx, and said second value y masked with said first masked value x′ as Boolean mask such that A=rx+(y xor x′),
- a second computing step computing a second intermediate value B from said first masked value x′ and said second value y masked by said first Boolean mask rx such that B=x′+(y xor rx),
- a third computing step computing a third intermediate value C from said first masked value x′ and said second masked value y′ such that C=x′ xor y′,
- a fourth computing step computing said boolean masked result of the arithmetic operation between said first value x and said second value y by performing said boolean exclusive OR operation between said first, second, and third intermediate values (A xor B xor C),
-
- a first computing step computing a first intermediate value A from said second boolean mask ry and said first value x masked with said second masked value y′ as Boolean mask such that A=ry+(x xor y′),
- a second computing step computing a second intermediate value B from said second masked value y′ and said first value x masked by said second Boolean mask ry such that B=y′+(x xor ry),
- a third computing step computing a third intermediate value C from said first masked value x′ and said second masked value y′ such that C=x′ xor y′,
- a fourth computing step computing said boolean masked result of the arithmetic operation between said first value (x) and said second value (y) by performing said boolean exclusive OR operation between said first, second, and third intermediate values (A xor B xor C),
-
- arithmetically masking said intermediate value by performing an arithmetic operation with said random value,
- and performing an arithmetic masking to boolean masking conversion of said arithmetically masked intermediate value into a Boolean masked intermediate value masked by the random value using a precomputed table.
-
- a processing system having at least one hardware processor (201) configured to perform the methods according to the first aspect,
- at least one memory for storing the first and second masked values and the results of the calculations performed during the different computing steps.
-
- a first computing step S21 during which the cryptographic device computes a first intermediate value A from said first masked value x′, said second boolean mask ry, said second masked value y′ and said first boolean mask rx such that A=(x′ xor ry)+(y′ xor rx),
- a second computing step S22 during which the cryptographic device computes a second intermediate value B from said first masked value x′, said second masked value y′, said first boolean mask rx, and said second boolean mask ry such that B=(x′ xor y′)+(rx xor ry),
- a third computing step S23 during which the cryptographic device computes a third intermediate value C from said first masked value x′, said second masked value y′ such that C=x′ xor y′,
- a fourth computing step S24 during which the cryptographic device computes said boolean masked result of the arithmetic operation between said first value x and said second value y by performing said XOR operation between said first, second, and third intermediate values. Said differently, the cryptographic device computes A xor B xor C which is equal to (x+y) xor (rx xor ry).
-
- a first computing step S21′ during which the cryptographic device computes a first intermediate value A from said first boolean mask rx, and said second value y masked by said first masked value x′ as Boolean mask such that A=rx+(y xor x′),
- a second computing step S22′ during which the cryptographic device computes a second intermediate value B from said first masked value x′ and said second value y masked by said first Boolean mask rx such that B=x′+(y xor rx),
- a third computing step S23′ during which the cryptographic device computes a third intermediate value C from said first masked value x′ and said second masked value y′ such that C=x′ xor y′,
- a fourth computing step S24′ during which the cryptographic device computes said boolean masked result of the arithmetic operation between said first value x and said second value y by performing a XOR operation between the first, second, and third intermediate values. Said differently, the cryptographic device computes A xor B xor C which is equal to (x+y) xor (rx xor ry).
-
- a first computing step S21″ during which the cryptographic device computes a first intermediate value A from said second boolean mask ry and said first value x masked with said second masked value y′ as Boolean mask such that A=ry+(x xor y′),
- a second computing step S22″ during which the cryptographic device computes a second intermediate value B from said second masked value y′ and said first value x masked by said second Boolean mask ry such that B=y′+(x xor ry),
- a third computing step S23″ during which the cryptographic device computes a third intermediate value C from said first masked value x′ and said second masked value y′ such that C=x′ xor y′,
- a fourth computing step S24″ during which the cryptographic device computes said boolean masked result of the arithmetic operation between said first value x and said second value y by performing a XOR operation between said first, second, and third intermediate values. Said differently, the cryptographic device computes A xor B xor C which is equal to (x+y) xor (rx xor ry).
-
- A←A+Rand, ie finally A=(x′ xor ry)+(y′ xor rx)+Rand, and
- B←B+Rand, ie finally B=(x′ xor y′)+(rx xor ry)+Rand
-
- A←A+Rand, ie finally A=rx+(y xor x′)+Rand, and
- B←B+Rand, ie finally B=x′+(y xor rx)+Rand
-
- A←A+Rand, ie finally A=ry+(x xor y′)+Rand, and
- B←B+Rand, ie finally B=y′+(x xor ry)+Rand
-
- A←CONV(A), ie finally A=(x′ xor ry)+(y′ xor rx) xor Rand, and
- B←CONV(B), ie finally B=(x′ xor y′)+(rx xor ry) xor Rand
-
- A←CONV(A), ie finally A=rx+(y xor x′) xor Rand, and
- B←CONV(B), ie finally B=x′+(y xor rx) xor Rand
-
- A←CONV(A), ie finally A=ry+(x xor y′) xor Rand, and
- B←CONV(B), ie finally B=y′+(x xor ry) xor Rand.
-
- ci=1 if Ai−1<mini-rand
- ci=0 if Ai−1>=mini-rand
-
- a. DBi←T(Bi−ci mod 2k/m)
- b. If Bi<mini-rand, then ci+1=1
- c. else if Bi>mini-rand, ci+1=0
-
- a. DAi←T(Ai−ci mod 2k/m)
- b. If Ai<mini-rand, then ci+1=1
- c. else if Ai>mini-rand, ci+1=0
-
- a processing system having at least one
hardware processor 201 configured to perform the steps of the methods according to the first aspect, - at least one memory for storing the first and second masked values and the results of the calculations performed during the different computing steps.
- a processing system having at least one
Claims (27)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP18305471 | 2018-04-17 | ||
| EP18305471.7 | 2018-04-17 | ||
| EP18305471.7A EP3557813A1 (en) | 2018-04-17 | 2018-04-17 | Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing boolean and arithmetic operations |
| PCT/EP2019/059836 WO2019201944A1 (en) | 2018-04-17 | 2019-04-16 | Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing boolean and arithmetic operations |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20210157586A1 US20210157586A1 (en) | 2021-05-27 |
| US11385893B2 true US11385893B2 (en) | 2022-07-12 |
Family
ID=62909463
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/048,262 Active US11385893B2 (en) | 2018-04-17 | 2019-04-16 | Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US11385893B2 (en) |
| EP (2) | EP3557813A1 (en) |
| WO (1) | WO2019201944A1 (en) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11822704B2 (en) * | 2018-10-29 | 2023-11-21 | Cryptography Research, Inc. | Constant time secure arithmetic-to-Boolean mask conversion |
| US11507699B2 (en) * | 2019-09-27 | 2022-11-22 | Intel Corporation | Processor with private pipeline |
| FR3101983B1 (en) | 2019-10-11 | 2021-11-12 | St Microelectronics Grenoble 2 | Determining an indicator bit |
| FR3101982B1 (en) | 2019-10-11 | 2024-03-08 | St Microelectronics Grenoble 2 | Determining an indicator bit |
| FR3101980B1 (en) * | 2019-10-11 | 2021-12-10 | St Microelectronics Grenoble 2 | Processor |
| US11599680B2 (en) * | 2019-11-20 | 2023-03-07 | Meta Platforms Technologies, Llc | Encryption and decryption engines with hybrid masking to prevent side channel attacks |
| FR3134909B1 (en) * | 2022-04-25 | 2024-06-21 | Commissariat Energie Atomique | PROTECTING AGAINST SIDE-CHANNEL ATTACKS USING SQUARE MASKING |
Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050232430A1 (en) * | 2004-04-16 | 2005-10-20 | Gebotys Catherine H | Security countermeasures for power analysis attacks |
| WO2008064704A1 (en) * | 2006-11-30 | 2008-06-05 | Telecom Italia S.P.A | Method and device for preventing information leakage attacks on a device implementing a cryptographic function |
| US8050402B2 (en) * | 2004-12-01 | 2011-11-01 | Telecom Italia S.P.A. | Method and related device for hardware-oriented conversion between arithmetic and boolean random masking |
| US8553877B2 (en) * | 2007-10-01 | 2013-10-08 | Blackberry Limited | Substitution table masking for cryptographic processes |
| US8681985B2 (en) * | 2010-01-20 | 2014-03-25 | Electronics & Telecommunications Research Institute | Masking operation method and device for symmetric key encrypted system |
| US20150110266A1 (en) * | 2012-03-02 | 2015-04-23 | Gemalto Sa | Countermeasure method against side channel analysis for cryptographic algorithms using boolean operations and arithmetic operations |
| US9166789B2 (en) * | 2012-03-06 | 2015-10-20 | Kabushiki Kaisha Toshiba | Cryptographic processing apparatus |
| US20180183576A1 (en) * | 2016-12-22 | 2018-06-28 | Shenzhen State Micro Technology Co Ltd | Mask s-box, block ciphers algorithm device and corresponding construction process |
| US10333699B1 (en) * | 2015-09-30 | 2019-06-25 | Cryptography Research, Inc. | Generating a pseudorandom number based on a portion of shares used in a cryptographic operation |
| US10505711B2 (en) * | 2016-02-22 | 2019-12-10 | Eshard | Method of protecting a circuit against a side-channel analysis |
| US10699030B2 (en) * | 2014-12-30 | 2020-06-30 | Cryptography Research Inc. | Determining cryptographic operation masks for improving resistance to external monitoring attacks |
| US10871947B2 (en) * | 2016-03-03 | 2020-12-22 | Cryptography Research, Inc. | Converting a boolean masked value to an arithmetically masked value for cryptographic operations |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2884387B1 (en) | 2013-12-13 | 2016-09-14 | Thomson Licensing | Efficient modular addition resistant to side-channel attacks |
-
2018
- 2018-04-17 EP EP18305471.7A patent/EP3557813A1/en not_active Withdrawn
-
2019
- 2019-04-16 EP EP19716953.5A patent/EP3782324A1/en active Pending
- 2019-04-16 WO PCT/EP2019/059836 patent/WO2019201944A1/en not_active Ceased
- 2019-04-16 US US17/048,262 patent/US11385893B2/en active Active
Patent Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050232430A1 (en) * | 2004-04-16 | 2005-10-20 | Gebotys Catherine H | Security countermeasures for power analysis attacks |
| US8050402B2 (en) * | 2004-12-01 | 2011-11-01 | Telecom Italia S.P.A. | Method and related device for hardware-oriented conversion between arithmetic and boolean random masking |
| WO2008064704A1 (en) * | 2006-11-30 | 2008-06-05 | Telecom Italia S.P.A | Method and device for preventing information leakage attacks on a device implementing a cryptographic function |
| US8553877B2 (en) * | 2007-10-01 | 2013-10-08 | Blackberry Limited | Substitution table masking for cryptographic processes |
| US8681985B2 (en) * | 2010-01-20 | 2014-03-25 | Electronics & Telecommunications Research Institute | Masking operation method and device for symmetric key encrypted system |
| US20150110266A1 (en) * | 2012-03-02 | 2015-04-23 | Gemalto Sa | Countermeasure method against side channel analysis for cryptographic algorithms using boolean operations and arithmetic operations |
| US9166789B2 (en) * | 2012-03-06 | 2015-10-20 | Kabushiki Kaisha Toshiba | Cryptographic processing apparatus |
| US10699030B2 (en) * | 2014-12-30 | 2020-06-30 | Cryptography Research Inc. | Determining cryptographic operation masks for improving resistance to external monitoring attacks |
| US10333699B1 (en) * | 2015-09-30 | 2019-06-25 | Cryptography Research, Inc. | Generating a pseudorandom number based on a portion of shares used in a cryptographic operation |
| US10505711B2 (en) * | 2016-02-22 | 2019-12-10 | Eshard | Method of protecting a circuit against a side-channel analysis |
| US10871947B2 (en) * | 2016-03-03 | 2020-12-22 | Cryptography Research, Inc. | Converting a boolean masked value to an arithmetically masked value for cryptographic operations |
| US20180183576A1 (en) * | 2016-12-22 | 2018-06-28 | Shenzhen State Micro Technology Co Ltd | Mask s-box, block ciphers algorithm device and corresponding construction process |
Non-Patent Citations (8)
| Title |
|---|
| CORON J.-S.; TCHULKINE A.: "A New Algorithm for Switching from Arithmetic to Boolean Masking", ELECTRONIC PUBLISHING, ARTISTIC IMAGING, AND DIGITAL TYPOGRAPHY, SPRINGER VERLAG, DE, vol. 2779, 1 January 2003 (2003-01-01), DE , pages 89 - 97, XP002340677, ISBN: 978-3-540-24128-7 |
| Coron J-S et al: "A New Algorithm for Switching from Arithmetic to Boolean Masking", Electronic Publishing, Artistic Imaging, and Digital Typography; [Lecture Notes in Computer Science, ISSN 0302-9743], Springer Verlag, DE, vol. 2779, Jan. 1, 2003, pp. 89-97, XP002340677, ISBN: 978-3-540-24128-7 p. 91, line 26-p. 92, line 9. |
| Fischer, W. et.al., Cryptographic Hardware and Embedded Systems Ches 2017, 2017, Springer, pp. 3-154. (Year: 2017). * |
| Fukushima, K., et al., Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure, 2017, IEEE, pp. 1032-1037. (Year: 2017). * |
| Leander, G., Fast Software Encrpytion, 2015, Springer, pp. 3-175. (Year: 2015). * |
| Mohamet Karroumi et al: "Addition with Blinded Operands", Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr. 14, 2014, XP055506390, Cham ISBN: 978-3-319-10175-0 Retrieved from the Internet: URL: http://Link.Springer.com/10.1007/978-3-319-10175-0 [retrieved on Sep. 12, 2018]. |
| PCT/EP2019/059836, International Search Report, dated May 2, 2019, European Patent Office, P.B.5818 Patentlaan 2 NL—2280 HV Rijswijk. |
| PCT/EP2019/059836, Written Opinion of the International Searching Authority, dated May 2, 2019, European Patent Office, D-80298 Munich. |
Also Published As
| Publication number | Publication date |
|---|---|
| US20210157586A1 (en) | 2021-05-27 |
| EP3782324A1 (en) | 2021-02-24 |
| EP3557813A1 (en) | 2019-10-23 |
| WO2019201944A1 (en) | 2019-10-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11385893B2 (en) | Method secured against side-channel attacks performing an arithmetic operation of a cryptographic algorithm mixing Boolean and arithmetic operations | |
| US11733966B2 (en) | Protection system and method | |
| Coron et al. | Conversion from arithmetic to boolean masking with logarithmic complexity | |
| US11256478B2 (en) | Method for securing a cryptographic process with SBOX against high-order side-channel attacks | |
| US10367637B2 (en) | Modular exponentiation with transparent side channel attack countermeasures | |
| US8009827B2 (en) | Encryption processing method and encryption processing device | |
| US8976960B2 (en) | Methods and apparatus for correlation protected processing of cryptographic operations | |
| CN106233660B (en) | Encryption processing device, encryption processing method, and program | |
| US10305689B2 (en) | Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program | |
| US11695542B2 (en) | Technology for generating a keystream while combatting side-channel attacks | |
| US11269993B2 (en) | Encryption device, encryption method, decryption device, and decryption method | |
| US20150349951A1 (en) | Protecting Cryptographic Operations Using Conjugacy Class Functions | |
| US20250055687A1 (en) | Method secured against side-channel attacks performing a cryptographic algorithm comprising a polynomial operation | |
| US10341089B2 (en) | High-speed AES with transformed keys | |
| US9571269B2 (en) | Encryption device, encryption method and program | |
| US20080130869A1 (en) | Method to Secure an Electronic Assembly Against Attacks by Error Introduction | |
| CN115934031B (en) | Computing engine, data processing method, device and storage medium | |
| EP3054620A1 (en) | System and method for performing block cipher cryptography by implementing a mixer function that includes a substitution-box and a linear transformation using a lookup-table | |
| US20240007266A1 (en) | Reconfigurable side-channel resistant double-throughput aes accelerator | |
| Chaves et al. | SCA-Resistance for AES: How Cheap Can We Go? | |
| JP7383949B2 (en) | Information processing equipment and programs | |
| EP3703305A1 (en) | Method secured against side-channel attacks with a new masking scheme protecting linear operations of a cryptographic algorithm | |
| KR101281275B1 (en) | Obfuscation method for process of encrypting/decrypting block cipher using boolean function expression and apparatus for the same | |
| US20250047461A1 (en) | Elliptic curve cryptography masked blinding countermeasure | |
| US20250086313A1 (en) | Secure processing system and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: THALES DIS FRANCE SA, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VIGILANT, DAVID;REEL/FRAME:054076/0655 Effective date: 20201008 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| AS | Assignment |
Owner name: THALES DIS FRANCE SAS, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THALES DIS FRANCE SA;REEL/FRAME:064235/0673 Effective date: 20211215 |